Thursday, October 24, 2019

Rosicrucian cipher

In 1513 Cornelius Agrippa introduce early form Rosicrucian Cipher in his books Occult of Philosophy. Geometric and simple substitution cipher are well known ciphers 
    Pigpen , Freemason, Napoleon and tic tac toe ciphers in which alphabets or symbols arrange in grids. 
This is an anagram, "How to reconstruct a data " lets encode the message.
      Pigpen cipher , Rosicrucian and Tic tac toe Cipher
                     Thank you have a good day.

   

Wednesday, October 16, 2019

ROT13 community

ROT13 is a member of substitution cipher class. I had discuss two members of  this class, if you remember. 
          Atbash cipher
          Affine Cipher (shift cipher)

If you remember the history which I had share you. Atbash cipher encode message by shifting key = -1 but in inverse direction.
          A = Z, B = Y and so on.
However in shift cipher key = 3.

                Message : HELLO
                                : JGNNQ
Both ciphers are special affine cipher case.
As you know shift cipher had introduced by julius caesar in rome. Julius had encoded message by shifting letter 3 time forward, so that it will not understand. However after 2 or 3 decade later it's is easy to decipher. The above example use same technique.In Rot13 alphabets shift by 13 letters. 
           A = N, B = O and so on.
        

Let time to solve a riddle: 
                 Yrg cynl n tnzr. Zl anzr vf Ze K. Zngurzngvpf fbyir ernyvgl ceboyrzf, ohg fpvrapr yngre cebir gur inyvqvgl bs zngurzngvpf ehyrf. Pna lbh qrpvcure gur grkg 


Rot13 use in encoded email, window xp registry and many places. Later prove that this cipher is not enough power to protect confidential data. 

Rot is very large community. Rot1, Rot 2,.... Rot 26, Rot 47 are available .
Rot5 deal with numeric but there is limit 0 - 4 
Rot13 deal with uppercase letter have 26 limit
Rot18 deal with uppercase letters and numeric values.
In Rot47 numbers, uppercase letters, lowercase letters, punctuations are use to secure the message. Best of luck 
                              vFC 59GAI @63;2 D3< H9K47 3:C6 `b J?>= B3E7]
                               Sgzmj xnt Gzud z mhbd czx

   

Friday, October 11, 2019

Solve Juggle Pieces

Hello guys, Today is quite interesting topic "Juggle the pieces", this is elaborate after affine ciphers.

Affine Ciphers are monoalphabetic ciphers, because every alphabet map against a number. Affine cipher introduce modulus operator. There are so many ciphers build on affine ciphers. Previous cipher Oh yeah, very well Atbash cipher also a good example of this category.
Mathematical Statement:
                E(X) = D(E(X))-----------------------------------------------------(0)
                here E is a function that take parameter x and return encrypted text. Similar with D function but this is inverse function of E.
                 E(x) = (ax+b) mod m--------------------------------------------(1)
                  a, b are keys and m is size of alphabetic, while modules (mod) is an operator which help to solve the equation. a , m both of them are co prime. X key-factor{R{0,..... m-1}}
                D(x) = a^-1 (x-b) mod m----------------------------------------(2)
 If inverse of a doesn't exit then you can't solve through affine cipher. It's a only condition that is necessary for this type of ciphers.
                   1 = aa^-1 mod m --------------------------------------------- (3)
Equation 3 prove that if a , m are co prime and a doesn't have any restriction it's solvable.

Rail Fence Cipher
Now you can solve monoalphabetic ciphers because you know game rules.
Now time to play with pieces.
This cipher belong to another class of cipher transposition cipher, this cipher called zig zag or rail fence cipher.
  There is a man who had receive a call from a private and he say "HOENEL MSEGRL SE" and then call had ended. He think that is just a prank call but the scene is quit awkward, so he try to decrypt the message will you help him. You can send me answer of this puzzle.
               Example 
                      message : "All is well"
                     A        L          S        E        L
                          L            I       W        L
                      Cipher text:  ALSELLIWL
How can I write like this, it's simple. In this cipher you can write text in zigzag form. Start from first row, then second row then first and so on. This is the case when key should be 2.
 However if K should be 3 or 4 or any higher order.
       
              A            S        W            X

                 L         I              E       L

                      L                       L 

Cipher text :      ASWLIELLL
One that i skip X means termination of string.
Thank you for reading


Thursday, October 10, 2019

Dirt speak truth.

Hello, Welcome back. Many people believe that ciphers start from caesar cipher. Some are believe hieroglyphics are first. When archeologist had discovered that israel civilization use cipher, 1000 years before egyptian civilization. Israel civilization had introduced first cipher system named as atbash cipher system.
Atbash cipher belong to monoalphabetic substitution cipher category. It's simple, You can replace first letter with last one and so on.
                        A = Z ,B = Y ...   
 Do you solve decipher a text
              message : "Meet me at 9pm "
you can comment your  answer in comment section.

In holy book ingir(Bible) there are many verses proves atbash cipher system existence. Sheshach  is word used in Holy Book. According to wikipedia Sheshach is common example. However this verse where Sheshach found "The king of Sheshach shall drink after them". When cryptographer decrypt with the help of atbash cipher, it provide us mind blowing information and that is Babylon. Babylon was a kingdom of Mesopotamia (Iran and iraq ).

Mathematical formula Encrypted message and return back original state.
                              E(X) = D(E(X))
This cipher is a special case of affine cipher.
                    E(X) = ((m-1)x+(m-1))mode m
    More details about affine cipher will be share next time.
Thank you , Have a nice day

Tuesday, October 8, 2019

Cryptography and Writings

Hello Guys, welcome back. I hope you had read so many poems, but cryptography also used in poetry. Wired Idea? No it's true, even cryptography use in Holy Books, writings etc. The Morning Sun, I hope you like to read this poem . How cryptography works in poetry , writings and holy books. 

Let's start with Holy books, there are thousand of meaning a single verses. That's a beauty of cryptography. In Sufism it's called divine layer which can hide in their verses. Verses are generic and abstract, so you can take advantage in any context, it will guide you. You can try it. People impress with this techniques, so they use in their own writing i.e Rumi, Sheikh Saadi etc. Everyone knows they had passed for hundred, thousands years ago but there are people who read them and understand them. Later Scientists like newtons, galileo etc also used in their books so that people don't understand how they calculate nature laws. I can know this because I have read most interesting novels Angels and Demons by Dan Brown. In the novel events and place are true but story are fictional. You like it if you want to read it.
Next is how poets used, most of time poets used different way to writing to tell you something. Words have meanings, but sometimes stanzas hide something i.e Paradise Lost
,Masnavi Rumi prove my point. However it's not same which I discuss last blog, it's entirely different. Layering similar to cryptography actually layering apply on abstract messages.

Another things many painters , architectures, artists use this technique. Magic square 4x4, Taj Mahals, Mona Lisa etc are various examples. Peoples builds great things, but now a days artists play with mathematics rules, like our grandparents and their grandparents did. Thank you Have a good day.

Do you support us?

Business address
0x1D24D8f27ea73ff604C7685246bdC6ae55bddaEF

Is it language unites or divides the nation

  One way to connect with the heart of the nation: a shared language. Caesar took an oath in the senate... but was it fact or just a clever ...

Achieves